New rules for vendor compliance
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000cab a2200000 4500</leader>
<controlfield tag="001">MAP20140027934</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20140801121219.0</controlfield>
<controlfield tag="008">140730e20140602esp|||p |0|||b|spa d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
<subfield code="d">MAP</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">86</subfield>
</datafield>
<datafield tag="100" ind1="1" ind2=" ">
<subfield code="0">MAPA20140012855</subfield>
<subfield code="a">Moynihan, John</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="0">
<subfield code="a">New rules for vendor compliance </subfield>
<subfield code="c">Moynihan, John </subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">If you are a health care vendor, financial or retail service provider, or federal government contractor, additional compliance responsibilities are on your horizon. In response to the unprecedented growth of outsourcing, hosting and contract employment, and in light of several high-profile vendor breaches, regulators have been focusing on the expansive third-party service provider community. Although often overlooked, third-party compliance has become critical for vendors who serve highly regulated industries.</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080546991</subfield>
<subfield code="a">Empresas</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20100024867</subfield>
<subfield code="a">Regulación económica</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080559984</subfield>
<subfield code="a">Outsourcing</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080560287</subfield>
<subfield code="a">Proveedores</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080608477</subfield>
<subfield code="a">Seguridad de servicios</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080602963</subfield>
<subfield code="a">Política de seguridad</subfield>
</datafield>
<datafield tag="650" ind1=" " ind2="4">
<subfield code="0">MAPA20080592479</subfield>
<subfield code="a">Planes de seguridad</subfield>
</datafield>
<datafield tag="773" ind1="0" ind2=" ">
<subfield code="w">MAP20077000291</subfield>
<subfield code="t">Risk Management Magazine</subfield>
<subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
<subfield code="x">0035-5593</subfield>
<subfield code="g">02/06/2014 Volumen 61 Número 5 - junio 2014 , p. 33-35</subfield>
</datafield>
</record>
</collection>